Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2023
A Probe Set Determination Method Based on Spanning Tree Algorithm
HP3C '23: Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and CommunicationsPages 15–20https://doi.org/10.1145/3606043.3606046With the rapid development of network technologies such as the Internet of Things, the scale of networks has gradually increased. The P2P networks have been gradually studied, and fault detection and localization for large-scale networks have become a ...
- research-articleNovember 2022
A Probabilistic Approach to Growth Networks
Single-class closed queueing networks, consisting of infinite-server and single-server queues with exponential service times and probabilistic routing, admit product-from solutions. Such solutions, although seemingly tractable, are difficult to ...
Widely used closed product-form networks have emerged recently as a primary model of stochastic growth of subcellular structures, for example, cellular filaments. The baseline bio-molecular model is equivalent to a single-class closed queueing network, ...
- research-articleNovember 2021
Towards the Design of Smart Vehicular Traffic Flow Prediction
MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless AccessPages 71–76https://doi.org/10.1145/3479241.3486701Thanks to the fast development of computing hardware and Machine Learning-based (ML) model, many impressive prediction models have been proposed under the topic of traffic flow prediction. While ML models highly improve the accuracy of the prediction ...
- articleMarch 2016
Efficient group key management for secure big data in predictable large-scale networks
Concurrency and Computation: Practice & Experience (CCOMP), Volume 28, Issue 4Pages 1174–1192https://doi.org/10.1002/cpe.3574It is challenging to secure group communications among large-scale networks due to their network scale. We observe that in many large-scale networks, the scale of actual group communication is nevertheless predicable and not very large. For instance, ...
- ArticleJuly 2015
A Distributed Flow Control with Backward Propagation
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 02Pages 355–360https://doi.org/10.1109/COMPSAC.2015.116In this paper, using an autonomous and distributed approach, we aim at realizing a control mechanism, which is scalable in terms of the network size, for joint optimization of the multi-path routing and bandwidth allocation (MRBA). Multi-path routing is ...
- ArticleMay 2013
A Fault-Tolerant Strong Conjunctive Predicate Detection Algorithm for Large-Scale Networks
IPDPSW '13: Proceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD ForumPages 1460–1469https://doi.org/10.1109/IPDPSW.2013.156In large-scale networks where a continuously on-going monitoring program is needed, using traditional predicate detection algorithms might cause the system to have a single point of failure. This paper presents an on-line distributed algorithm that ...
- ArticleJuly 2011
Efficient Information Source Monitoring Method Considering User Utility in Large-Scale Networks
SAINT '11: Proceedings of the 2011 IEEE/IPSJ International Symposium on Applications and the InternetPages 388–393https://doi.org/10.1109/SAINT.2011.74This paper proposes an efficient information monitoring method in large-scale network, which adjusts its observation intervals according to the information sources' update intervals considering user utility decrease and monitoring cost. The usefulness ...
- ArticleJuly 2011
Attribute description service for large-scale networks
An analysis of requesting resources from large-scale networks reveals a fundamental challenge. As the network grows, more and more resources become available, and so finding resources that fit experimental test criteria becomes difficult and time ...
- research-articleJune 2009
Social influence analysis in large-scale networks
KDD '09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data miningPages 807–816https://doi.org/10.1145/1557019.1557108In large social networks, nodes (users, entities) are influenced by others for various reasons. For example, the colleagues have strong influence on one's work, while the friends have strong influence on one's daily life. How to differentiate the social ...
- ArticleApril 2009
Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System
NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02Pages 484–487https://doi.org/10.1109/NSWCTC.2009.315As P2P applications and the amount of users continue to increase rapidly, the problems which the Internet faces, such as network congestion and the difficulty in ensuring Qos etc, become more and more serious. This paper design a model of Distributed ...
- ArticleSeptember 2007
Network simulation in a fragmented mobile agent network
This paper deals with the simulation of a multi-agent system based on the Fragmented Mobile Agent Network model. The model consists of agent teams performing remote software management operations and network elements that connect processing nodes and ...
- ArticleOctober 2006
Teamwork coordination in large-scale mobile agent networks
KES'06: Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IPages 236–243https://doi.org/10.1007/11892960_29This paper deals with multi-agent systems coordinated via teamwork in large-scale networks. A formal model based on the Fragmented Mobile Agent Network is proposed. An agent team is described as a knowledge-based system that includes subteams consisting ...
- articleMay 2006
A Web-based integrated education system for a seamless environment among teachers, students, and administrators
The authors created a Web-based integrated education support system that unified the data in the administrative system and the education system in a university. The purpose of the system was to make the administrative system and education system data ...